SlideShare a Scribd company logo
1 of 33
WEBINAR
MFA VS. 2FA
JUST A NUMBERS GAME, OR REAL VALUE?
APRIL 2018
MICHAEL THELANDER / SR DIRECTOR PRODUCT MARKETING
2
A PRIMER ON AUTHENTICATION FACTORS
Something you
KNOW
3
A PRIMER ON AUTHENTICATION FACTORS
Something you
HAVE
4
A PRIMER ON AUTHENTICATION FACTORS
Something you
ARE
Identity
verified
5
A PRIMER ON MULTI-FACTOR AUTHENTICATION
Something you
ARE
Something you
HAVE
Something you
KNOW
6
A PRIMER ON MULTI-FACTOR AUTHENTICATION
“A cord with three strands is not easily broken.”
AGENDA
7
WHAT’S NOT MFA?
WHAT’S TRUE MFA?
WHO ASKS FOR MFA?
WHAT NOW?
WHAT’S NOT MFA?
THE RISE OF TWO FACTOR AUTHENTICATION
9
 A way to resolve inherent issues with
passwords
 Adds an additional, out-of-band
authentication that comes through
security dongles or the user’s phone
 Ostensibly, this provides additional
assurance that the user’s account
hasn’t been compromised or is subject
to a man-in-the-middle attack
AUTHENTICATING WITH TWO FACTORS
B E T T E R T H A N O N E , B U T S T I L L … .
10
 If the 2nd factor is delivered through
SS7 protocol it’s susceptible to intercept
 SMS messaging as a way to transfer 2-
factor messages has been removed
from NIST security guidance (see 800-63-3)
 Weaknesses have been uncovered in
almost every form of 2FA, though push
notification to a mobile app seems
most secure
AUTHENTICATING WITH TWO FACTORS
B E T T E R T H A N O N E , B U T S T I L L … .
11
MULTI-METHOD DOESN’T MEAN MULTI -FACTOR
Something you
KNOW
WHAT’S TRUE MFA?
NOT JUST MULTIPLE FACTORS, BUT HOW THEY’RE
USED
13
IT’S ALL ABOUT THE USER’S DEVICE
A N E N G I N E F O R C O N T E X T A N D R I S K
DEVICE ID
GEO LOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXT
ASSOCIATIONS &
REPUTATION
USER 1 ACCESS
14
RISK INSIGHT FROM THE USER’S DEVICE
+1000
DEVICE ID
GEO LOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXT
ASSOCIATIONS &
REPUTATION
USER 1 ACCESS
+10
SCORE
LOW RISK
=
Frictionless
Consumer
Experience
+10SCORE
15
CLEARKEY
A N E N G I N E F O R C O N T E X T A N D R I S K
DEVICE ID
GEO LOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXT
ASSOCIATIONS &
REPUTATION
USER 2 ACCESS
+10
SCORE
MEDIUM
RISK=
Moderate
Friction
USERNAME
&
PASSWORD
0SCORE
+200
16
CLEARKEY
A N E N G I N E F O R C O N T E X T A N D R I S K
DEVICE ID
GEO LOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXT
ASSOCIATIONS &
REPUTATION
USER 3 ACCESS
+10
SCORE
HIGH RISK=
PIN +
Biometric
Factors
-10SCORE
0
17
CLEARKEY
A N E N G I N E F O R C O N T E X T A N D R I S K
DEVICE ID
GEO LOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXT
ASSOCIATIONS &
REPUTATION
USER 3 ACCESS
+10
SCORE
HIGH RISK=
Step-Up
Authentication
-10SCORE
Watch Lists
-1000
Watch ListsWatch ListsWatch Lists
Call
Customer
Service
18
MOBILE MULTIFACTOR AUTHENTICATION
S T R O N G A N D F L E X I B L E A U T H E N T I C A T I O N
Identity
verified
+ +
WHO ASKS FOR MFA?
WHAT REGULATIONS AND STANDARDS ARE IN PLAY?
20
13 January 2018
 PSD2 goes into effect for member states
November-December 2018
 The RTS (Regulatory Technical Standards) enter into force
 Exceptions are managed
 Systems are auditable
SIMPLE DEADLINES
21
TWO THINGS TO NOTE
 This is about
“out-of-band”
authentication
 Basically, use
two different
channels and
two different
methods to
authenticate
and authorize
22
TWO THINGS TO NOTE
Smith Fashions
wants to have
€250. Is this
OK?
What for?
Looks like you
ordered a new
coat at
breakfast.
That’s right.
Go ahead.
23
SCA REQUIRES AUTHORIZATION
D I F F E R E N T F R O M A U T H E N T I C A T I O N
• Identity assurance
• Are you really you?
• How have you proven you
are you?
AUTHENTICATION
• OK, you’re you!
• But are you authorized to do
what you’re asking to do?
• Do you approve this?
AUTHORIZATION
24
First-Party
Authorization
Multi-Party
Authorization
O
R
A U T H O R I Z E I N D I V I D U A L O R G R O U P T R A N S A C T I O N S
25
WHO ELSE ASKS FOR BETTER
AUTHENTICATION?
Meet the user
experience team, aka:
• Digital experience
• Digital transformation
• Customer experience
• Millennials who know
what “good” user
experience looks like,
feels like, and measures
Poor or complex
authentication is the
Number One
complaint of users
across all verticals:
• Finance
• E-Commerce
• Social
• Insurance
WHAT NOW?
WORKING WITH CROSS-FUNCTIONAL TEAMS
27FRAUD TEAM IAM & INFOSEC TEAM USER EXPERIENCE TEAM
ENGAGE YOUR CROSS -FUNCTIONAL TEAMS
28
ENGAGE YOUR CROSS -FUNCTIONAL TEAMS
 The Fraud Team has
irreplaceable insight but
is often seen as tactical
 The fraud team also has
something most teams
don’t: actual cost metrics
 Create an alliance!
 Learn the language of
infosec experts
FRAUD TEAM
 Nobody wants to be the
“Director of No”
 Look to your left and right
and reach out
 Become customer-centric
 Consider ideas outside of
the infosec sphere
 Understand what Fraud is
IAM & INFOSEC TEAM
 Be a Change Agent – all
the power is in your
hands
 Teach the other teams
your language and your
metrics
 Enlist aid, ask for help
 Be the expert, but get
everyone else to care
about the user journey
USER EXPERIENCE TEAM
29
30
31
iovation.com/dummie
s
Go to
to register for your free copy
32
IOVATION’S FRAUD FORCE
R E G I S T R A T I O N I S O P E N
LONDON CHICAGO
JUNE 4-6-2018 OCT 17-18OCTOBER 2-4, 2018
CONTACT US
@TheOtherMichael
SENIOR DIRECTOR OF PRODUCT MARKETING
MICHAEL
THELANDER
michael.thelander@iovation.com
www.iovation.com

More Related Content

Similar to MFA vs 2FA: Is It Just a Numbers Game or Real Value

iovation's Dynamic Authentication Suite
iovation's Dynamic Authentication Suiteiovation's Dynamic Authentication Suite
iovation's Dynamic Authentication SuiteMichael Thelander
 
Reduce Friction and Risk with Device Authentication
Reduce Friction and Risk with Device AuthenticationReduce Friction and Risk with Device Authentication
Reduce Friction and Risk with Device AuthenticationTransUnion
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...TransUnion
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...TransUnion
 
Multi-factor Authentication for dummies part 2: Adaptive Risk-Based MFA
Multi-factor Authentication for dummies part 2: Adaptive Risk-Based MFAMulti-factor Authentication for dummies part 2: Adaptive Risk-Based MFA
Multi-factor Authentication for dummies part 2: Adaptive Risk-Based MFATransUnion
 
Doubling Down Winning over your VIP Customers Webinar with iovation
Doubling Down Winning over your VIP Customers Webinar with iovation Doubling Down Winning over your VIP Customers Webinar with iovation
Doubling Down Winning over your VIP Customers Webinar with iovation TransUnion
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer ExperienceTransUnion
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays
 
The Road to Identity 2.0
The Road to Identity 2.0The Road to Identity 2.0
The Road to Identity 2.0Adam Lewis
 
Ransomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSenseRansomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSenseSophiaPalmira1
 
CynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware BootcampCynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware BootcampSophia Price
 
Authentifusion: Clarifying the Future of Customer Authentication
Authentifusion: Clarifying the Future of Customer AuthenticationAuthentifusion: Clarifying the Future of Customer Authentication
Authentifusion: Clarifying the Future of Customer AuthenticationMichael Thelander
 
Consumer Views on Authentication with Aite Group
Consumer Views on Authentication with Aite GroupConsumer Views on Authentication with Aite Group
Consumer Views on Authentication with Aite GroupTransUnion
 
When Customers Win: Omnichannel Authentication in the Age of the Empowered Co...
When Customers Win: Omnichannel Authentication in the Age of the Empowered Co...When Customers Win: Omnichannel Authentication in the Age of the Empowered Co...
When Customers Win: Omnichannel Authentication in the Age of the Empowered Co...TransUnion
 
When Customers Win: 
OmniChannel Authentication 
When Customers Win: 
OmniChannel Authentication When Customers Win: 
OmniChannel Authentication 
When Customers Win: 
OmniChannel Authentication Michael Thelander
 
How to Build ROI for Conversational AI
How to Build ROI for Conversational AIHow to Build ROI for Conversational AI
How to Build ROI for Conversational AIAggregage
 
Lunch and Learn: Recognising the Good Guys
Lunch and Learn: Recognising the Good GuysLunch and Learn: Recognising the Good Guys
Lunch and Learn: Recognising the Good GuysTransUnion
 
DFS21_Workshop_Tristan Wattiez and Peter Feijen_Transmit Security_211130
DFS21_Workshop_Tristan Wattiez and Peter Feijen_Transmit Security_211130DFS21_Workshop_Tristan Wattiez and Peter Feijen_Transmit Security_211130
DFS21_Workshop_Tristan Wattiez and Peter Feijen_Transmit Security_211130FinTech Belgium
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsTransUnion
 
Ponemon - Cost of Failed Trust: Threats and Attacks
Ponemon - Cost of Failed Trust: Threats and AttacksPonemon - Cost of Failed Trust: Threats and Attacks
Ponemon - Cost of Failed Trust: Threats and AttacksVenafi
 

Similar to MFA vs 2FA: Is It Just a Numbers Game or Real Value (20)

iovation's Dynamic Authentication Suite
iovation's Dynamic Authentication Suiteiovation's Dynamic Authentication Suite
iovation's Dynamic Authentication Suite
 
Reduce Friction and Risk with Device Authentication
Reduce Friction and Risk with Device AuthenticationReduce Friction and Risk with Device Authentication
Reduce Friction and Risk with Device Authentication
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
 
Multi-factor Authentication for dummies part 2: Adaptive Risk-Based MFA
Multi-factor Authentication for dummies part 2: Adaptive Risk-Based MFAMulti-factor Authentication for dummies part 2: Adaptive Risk-Based MFA
Multi-factor Authentication for dummies part 2: Adaptive Risk-Based MFA
 
Doubling Down Winning over your VIP Customers Webinar with iovation
Doubling Down Winning over your VIP Customers Webinar with iovation Doubling Down Winning over your VIP Customers Webinar with iovation
Doubling Down Winning over your VIP Customers Webinar with iovation
 
Balancing Security and Customer Experience
Balancing Security and Customer ExperienceBalancing Security and Customer Experience
Balancing Security and Customer Experience
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
 
The Road to Identity 2.0
The Road to Identity 2.0The Road to Identity 2.0
The Road to Identity 2.0
 
Ransomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSenseRansomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSense
 
CynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware BootcampCynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware Bootcamp
 
Authentifusion: Clarifying the Future of Customer Authentication
Authentifusion: Clarifying the Future of Customer AuthenticationAuthentifusion: Clarifying the Future of Customer Authentication
Authentifusion: Clarifying the Future of Customer Authentication
 
Consumer Views on Authentication with Aite Group
Consumer Views on Authentication with Aite GroupConsumer Views on Authentication with Aite Group
Consumer Views on Authentication with Aite Group
 
When Customers Win: Omnichannel Authentication in the Age of the Empowered Co...
When Customers Win: Omnichannel Authentication in the Age of the Empowered Co...When Customers Win: Omnichannel Authentication in the Age of the Empowered Co...
When Customers Win: Omnichannel Authentication in the Age of the Empowered Co...
 
When Customers Win: 
OmniChannel Authentication 
When Customers Win: 
OmniChannel Authentication When Customers Win: 
OmniChannel Authentication 
When Customers Win: 
OmniChannel Authentication 
 
How to Build ROI for Conversational AI
How to Build ROI for Conversational AIHow to Build ROI for Conversational AI
How to Build ROI for Conversational AI
 
Lunch and Learn: Recognising the Good Guys
Lunch and Learn: Recognising the Good GuysLunch and Learn: Recognising the Good Guys
Lunch and Learn: Recognising the Good Guys
 
DFS21_Workshop_Tristan Wattiez and Peter Feijen_Transmit Security_211130
DFS21_Workshop_Tristan Wattiez and Peter Feijen_Transmit Security_211130DFS21_Workshop_Tristan Wattiez and Peter Feijen_Transmit Security_211130
DFS21_Workshop_Tristan Wattiez and Peter Feijen_Transmit Security_211130
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their Carts
 
Ponemon - Cost of Failed Trust: Threats and Attacks
Ponemon - Cost of Failed Trust: Threats and AttacksPonemon - Cost of Failed Trust: Threats and Attacks
Ponemon - Cost of Failed Trust: Threats and Attacks
 

More from TransUnion

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...TransUnion
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesTransUnion
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipTransUnion
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar TransUnion
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4TransUnion
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayTransUnion
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedTransUnion
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalTransUnion
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingTransUnion
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...TransUnion
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemTransUnion
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropeTransUnion
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report HighlightsTransUnion
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityTransUnion
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...TransUnion
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPRTransUnion
 
Achieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceAchieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceTransUnion
 
Webinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry ReportWebinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry ReportTransUnion
 
Has THAT device been involved in past fraud?
Has THAT device been involved in past fraud?Has THAT device been involved in past fraud?
Has THAT device been involved in past fraud?TransUnion
 
Achieving Strong Customer Authentication Without Losing the Customer
Achieving Strong Customer Authentication Without Losing the CustomerAchieving Strong Customer Authentication Without Losing the Customer
Achieving Strong Customer Authentication Without Losing the CustomerTransUnion
 

More from TransUnion (20)

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data Strategies
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data Stewardship
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to Play
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost Broking
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
 
Achieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer ExperienceAchieving both GDPR Compliance and a Positive Customer Experience
Achieving both GDPR Compliance and a Positive Customer Experience
 
Webinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry ReportWebinar Slides: 2018 iovation Gambling Industry Report
Webinar Slides: 2018 iovation Gambling Industry Report
 
Has THAT device been involved in past fraud?
Has THAT device been involved in past fraud?Has THAT device been involved in past fraud?
Has THAT device been involved in past fraud?
 
Achieving Strong Customer Authentication Without Losing the Customer
Achieving Strong Customer Authentication Without Losing the CustomerAchieving Strong Customer Authentication Without Losing the Customer
Achieving Strong Customer Authentication Without Losing the Customer
 

Recently uploaded

CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfLivetecs LLC
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 

Recently uploaded (20)

CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdf
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 

MFA vs 2FA: Is It Just a Numbers Game or Real Value

  • 1. WEBINAR MFA VS. 2FA JUST A NUMBERS GAME, OR REAL VALUE? APRIL 2018 MICHAEL THELANDER / SR DIRECTOR PRODUCT MARKETING
  • 2. 2 A PRIMER ON AUTHENTICATION FACTORS Something you KNOW
  • 3. 3 A PRIMER ON AUTHENTICATION FACTORS Something you HAVE
  • 4. 4 A PRIMER ON AUTHENTICATION FACTORS Something you ARE Identity verified
  • 5. 5 A PRIMER ON MULTI-FACTOR AUTHENTICATION Something you ARE Something you HAVE Something you KNOW
  • 6. 6 A PRIMER ON MULTI-FACTOR AUTHENTICATION “A cord with three strands is not easily broken.”
  • 7. AGENDA 7 WHAT’S NOT MFA? WHAT’S TRUE MFA? WHO ASKS FOR MFA? WHAT NOW?
  • 8. WHAT’S NOT MFA? THE RISE OF TWO FACTOR AUTHENTICATION
  • 9. 9  A way to resolve inherent issues with passwords  Adds an additional, out-of-band authentication that comes through security dongles or the user’s phone  Ostensibly, this provides additional assurance that the user’s account hasn’t been compromised or is subject to a man-in-the-middle attack AUTHENTICATING WITH TWO FACTORS B E T T E R T H A N O N E , B U T S T I L L … .
  • 10. 10  If the 2nd factor is delivered through SS7 protocol it’s susceptible to intercept  SMS messaging as a way to transfer 2- factor messages has been removed from NIST security guidance (see 800-63-3)  Weaknesses have been uncovered in almost every form of 2FA, though push notification to a mobile app seems most secure AUTHENTICATING WITH TWO FACTORS B E T T E R T H A N O N E , B U T S T I L L … .
  • 11. 11 MULTI-METHOD DOESN’T MEAN MULTI -FACTOR Something you KNOW
  • 12. WHAT’S TRUE MFA? NOT JUST MULTIPLE FACTORS, BUT HOW THEY’RE USED
  • 13. 13 IT’S ALL ABOUT THE USER’S DEVICE A N E N G I N E F O R C O N T E X T A N D R I S K DEVICE ID GEO LOCATION DEVICE INTEGRITY ADDITIONAL DEVICE CONTEXT ASSOCIATIONS & REPUTATION USER 1 ACCESS
  • 14. 14 RISK INSIGHT FROM THE USER’S DEVICE +1000 DEVICE ID GEO LOCATION DEVICE INTEGRITY ADDITIONAL DEVICE CONTEXT ASSOCIATIONS & REPUTATION USER 1 ACCESS +10 SCORE LOW RISK = Frictionless Consumer Experience +10SCORE
  • 15. 15 CLEARKEY A N E N G I N E F O R C O N T E X T A N D R I S K DEVICE ID GEO LOCATION DEVICE INTEGRITY ADDITIONAL DEVICE CONTEXT ASSOCIATIONS & REPUTATION USER 2 ACCESS +10 SCORE MEDIUM RISK= Moderate Friction USERNAME & PASSWORD 0SCORE +200
  • 16. 16 CLEARKEY A N E N G I N E F O R C O N T E X T A N D R I S K DEVICE ID GEO LOCATION DEVICE INTEGRITY ADDITIONAL DEVICE CONTEXT ASSOCIATIONS & REPUTATION USER 3 ACCESS +10 SCORE HIGH RISK= PIN + Biometric Factors -10SCORE 0
  • 17. 17 CLEARKEY A N E N G I N E F O R C O N T E X T A N D R I S K DEVICE ID GEO LOCATION DEVICE INTEGRITY ADDITIONAL DEVICE CONTEXT ASSOCIATIONS & REPUTATION USER 3 ACCESS +10 SCORE HIGH RISK= Step-Up Authentication -10SCORE Watch Lists -1000 Watch ListsWatch ListsWatch Lists Call Customer Service
  • 18. 18 MOBILE MULTIFACTOR AUTHENTICATION S T R O N G A N D F L E X I B L E A U T H E N T I C A T I O N Identity verified + +
  • 19. WHO ASKS FOR MFA? WHAT REGULATIONS AND STANDARDS ARE IN PLAY?
  • 20. 20 13 January 2018  PSD2 goes into effect for member states November-December 2018  The RTS (Regulatory Technical Standards) enter into force  Exceptions are managed  Systems are auditable SIMPLE DEADLINES
  • 21. 21 TWO THINGS TO NOTE  This is about “out-of-band” authentication  Basically, use two different channels and two different methods to authenticate and authorize
  • 22. 22 TWO THINGS TO NOTE Smith Fashions wants to have €250. Is this OK? What for? Looks like you ordered a new coat at breakfast. That’s right. Go ahead.
  • 23. 23 SCA REQUIRES AUTHORIZATION D I F F E R E N T F R O M A U T H E N T I C A T I O N • Identity assurance • Are you really you? • How have you proven you are you? AUTHENTICATION • OK, you’re you! • But are you authorized to do what you’re asking to do? • Do you approve this? AUTHORIZATION
  • 24. 24 First-Party Authorization Multi-Party Authorization O R A U T H O R I Z E I N D I V I D U A L O R G R O U P T R A N S A C T I O N S
  • 25. 25 WHO ELSE ASKS FOR BETTER AUTHENTICATION? Meet the user experience team, aka: • Digital experience • Digital transformation • Customer experience • Millennials who know what “good” user experience looks like, feels like, and measures Poor or complex authentication is the Number One complaint of users across all verticals: • Finance • E-Commerce • Social • Insurance
  • 26. WHAT NOW? WORKING WITH CROSS-FUNCTIONAL TEAMS
  • 27. 27FRAUD TEAM IAM & INFOSEC TEAM USER EXPERIENCE TEAM ENGAGE YOUR CROSS -FUNCTIONAL TEAMS
  • 28. 28 ENGAGE YOUR CROSS -FUNCTIONAL TEAMS  The Fraud Team has irreplaceable insight but is often seen as tactical  The fraud team also has something most teams don’t: actual cost metrics  Create an alliance!  Learn the language of infosec experts FRAUD TEAM  Nobody wants to be the “Director of No”  Look to your left and right and reach out  Become customer-centric  Consider ideas outside of the infosec sphere  Understand what Fraud is IAM & INFOSEC TEAM  Be a Change Agent – all the power is in your hands  Teach the other teams your language and your metrics  Enlist aid, ask for help  Be the expert, but get everyone else to care about the user journey USER EXPERIENCE TEAM
  • 29. 29
  • 30. 30
  • 32. 32 IOVATION’S FRAUD FORCE R E G I S T R A T I O N I S O P E N LONDON CHICAGO JUNE 4-6-2018 OCT 17-18OCTOBER 2-4, 2018
  • 33. CONTACT US @TheOtherMichael SENIOR DIRECTOR OF PRODUCT MARKETING MICHAEL THELANDER michael.thelander@iovation.com www.iovation.com